• About Me Card

Max Hemingway

~ Musings as I work through life, career and everything.

Max Hemingway

Tag Archives: Security

IoT Device Security Considerations and Security Layers – Chipset

07 Wednesday Oct 2015

Posted by Max Hemingway in Architecture, IoT, Security

≈ 4 Comments

Tags

Architecture, IoT, Security

ThingsContinuing the theme of IoT Security as first discussed in my post IoT Device Security Considerations and Security Layers, the next layer to look at is the Chipset.

There are lots of different chipsets available that can be used for IoT devices such as ARM, Intel, TI, etc. There are also lots of development platforms utilising these and other chipsets such as Raspberry Pi, Beagle, MinnowBoard MAX, Contiki, TinyOS, Nano-RK, Launchpad etc that consume these chipsets.

Chipset manufacturers have already recognised the importance of having a good security layer and security features within and supported by the chipsets manufactured for the IoT.

To build on this capability some manufactures are buying security solutions to complement and enhance, whilst others are creating.

  • ARM Expands IoT Security Capability with Acquisition of Sansa Security
  • Intel working with McAfee

These developments by Chipset manufacturers means that IoT Security is high on their agenda and provides the industry and consumer with a large amount of choice on additional security features based on chip and that can work with the chip in form of software.

As the IoT develops so will the security enhancements and capabilities of these devices.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pocket (Opens in new window) Pocket
  • Share on Telegram (Opens in new window) Telegram
  • Share on Threads (Opens in new window) Threads
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Nextdoor (Opens in new window) Nextdoor
Like Loading...

IoT Device Security Considerations and Security Layers – Power Source

06 Tuesday Oct 2015

Posted by Max Hemingway in Architecture, IoT, Security

≈ 4 Comments

Tags

Architecture, IoT, Security

ThingsFollowing on from my post on IoT Device Security Considerations and Security Layers the subject of this blog post is to look at the Power Source layer.

Power Sources for IoT Devices will differ depending upon the type of IoT Device being used or designed and its use, however they will fall into 3 main source of power.

  • Mains
  • Battery
  • Wireless

So how secure is a power source? There have been demonstrations on how data can be hacked through power outlets (How to use electrical outlets and cheap lasers to steal data) which have concentrated on using the fluctuations and noise in the power supply to work out what is being typed. This would effect both mains and wireless connections as these could be monitored in some way.  Battery presents a more secure method of providing a power supply.

At present any breaches using a power source are few and far between, however as the IoT connected world continues to evolve, perhaps this is one area that more security considerations are needed.

Not all IoT Devices will need mains power as there is a huge drive for wearables and mobile. The mains power would be aimed more at IoT devices within a business (such as plant machinery sensors) or a home system (turning on power or heating).

Mains also provides a medium to connect IoT devices such as Smart Meters or a Home Network over the mains using Ethernet to Power converters. IoT devices may well utilise this as a method to communicate back to a local hub, then off to a central hub via normal network connectivity.

There are already standards/rules for smart meters set out to protect devices and consumers around:

  • Data Access and Privacy
  • Security

(Smart meters and how they work)

Battery IoT Devices tend to be self contained for power and apart from a future change of the battery when its power expires connectivity and networking tend to be through the front end.

As the IoT advances there will be advancements in the protection for devices and in the rules that govern them. Not all devices will be equal with the same power needs, but one thing is constant. They all need power to operate in one form or another.

Some useful links:

  • IEEE IoT Standards
  • Groups and Communities currently discussing and creating IoT Standards

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pocket (Opens in new window) Pocket
  • Share on Telegram (Opens in new window) Telegram
  • Share on Threads (Opens in new window) Threads
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Nextdoor (Opens in new window) Nextdoor
Like Loading...

IoT Device Security Considerations and Security Layers

05 Monday Oct 2015

Posted by Max Hemingway in IoT, Security

≈ 20 Comments

Tags

IoT, Security

ThingsSecurity is one of the main “IoT Standards” that a lot of groups, communities, vendors and manufacturers are currently tackling. The IoT is creating a vast amount of opportunities for sensors and devices to be created and used, but also creating a vast amount of security areas that need to be considered.

Due to the possible combinations of sensors and uses available for IoT devices this makes having a single standard or solution impossible. Instead security will evolve in a layered approach with the ability to be interlinked within a device in order to provide the layer of security needed. As well as combining these layers it is also important that any security applied is up to date and if possible has the ability to be kept up to date with latest patches and updates.

Below is an illustration of some possible layers that need to be considered when looking into designing an IoT device.

IoT Device Security

I will delve a bit deeper into each of these areas in following blog posts (Links below updated as each post is written)

  • Power Source
  • Chipset
  • Storage/Data
  • Sensor/Instrument
  • Operating System
  • Application
  • Device/Application API’s
  • User Interface
  • Access Control & Authentication
  • Encryption
  • Network Communication
  • Security/Security API’s

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pocket (Opens in new window) Pocket
  • Share on Telegram (Opens in new window) Telegram
  • Share on Threads (Opens in new window) Threads
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Nextdoor (Opens in new window) Nextdoor
Like Loading...

The Internet of Security and Things

08 Tuesday Sep 2015

Posted by Max Hemingway in Big Data, Cloud, IoT, Security

≈ Leave a comment

Tags

Cloud, Data, IoT, Security

How secure is the Internet of Things?

Traditionally we have been used to MThingsalware protection and Anti-Virus on our PC’s, then moving to laptops and other devices. Now on phones and slowly moving towards
the Internet of Things.  One article in the news today caught my eye where it is reported that Malware is being found pre-installed on devices, in this case Mobile Phones. G Data Report

It would seem that the hackers are trying to get the jump on the industry well before the devices are falling into the hands of the consumer. This is not the first time such incidents have been reported.

The race for Internet of Things sensors, devices and “Things” is growing fast, however with these incidents of Malware being found, how long will it be before code is appearing on chips on sensors that shouldn’t be there.

There are lots of Operating Systems available for the IOT. These can be classed as the mainstream ones that appear in the news and everyone knows such as Microsoft, Raspberry Pi, Linux etc, to the less know ones that are used on chipsets such as Contiki, TinyOS, Nano-RK.   (See https://maxhemingway.com/2015/04/14/iot-operating-systems/).

There are a number of challenges for the IoT industry, businesses and consumers (this list is not exhaustive);

  • Authentication
  • Data Capture
  • Encryption
  • Intrusion – Application, Network and Physical
  • Location tracking
  • Malware/Anti-Virus
  • Service disruption
  • Taking control of devices

These threats will drive the Internet of Security to protect the Internet of Things.

Cisco is looking to tackle some of these by running a Security Grand Challenge to offer prizes to the best security solutions.

More competitions and challenges will probably emerge as the industries try to understand and protect against the risks and use a crowd source model to help protect the IoT.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pocket (Opens in new window) Pocket
  • Share on Telegram (Opens in new window) Telegram
  • Share on Threads (Opens in new window) Threads
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Nextdoor (Opens in new window) Nextdoor
Like Loading...

IoT Cloak of Invisibility

10 Tuesday Feb 2015

Posted by Max Hemingway in Cloud, Innovation, IoT, Security

≈ Leave a comment

Tags

Cloud, Innovation, IoT, Security

With the upsurge in the IoT (Internet of Things), wearable tech and the desire to be constantly connected within the world, there is also now an emerging market of other things to protect yourself as security devices.

Once such item is an RFID Blocking Wallet that protects your debit and credit cards from giving off data or paying for things that you were not aware of – “Contactless ‘charging errors’ at Marks and Spencer”.

Redcoat

Maybe going forward may see a “Cloak of Invisibility” not as a garment to turn is completely invisible to the naked eye, but more a garment that blocks our signals from the IoT providing a high level of personal security or as a “Firewall Blanket” or a “Firewall Coat/Garment” maybe letting certain of your information through. Providing a layer of protection and security to the user.

I see this as maybe working at a thread level within the garment using low level power flows to disrupt the signals of the IoT or being used to broadcast a blocking frequency, only allowing certain frequencies/digital pulses out and in.

As the IoT develops, I’m sure the level of personal security will as well.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Email a link to a friend (Opens in new window) Email
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Pocket (Opens in new window) Pocket
  • Share on Telegram (Opens in new window) Telegram
  • Share on Threads (Opens in new window) Threads
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Nextdoor (Opens in new window) Nextdoor
Like Loading...
Newer posts →

Follow Me on LinkedIn

www.linkedin.com – Click to Follow 

RSS Feed

RSS Feed RSS - Posts

Other Publications I contribute to

https://sparrowhawkbushcraft.com/

Recent Posts

  • 35 Informative Tech Websites for 2026: Enhance Your PKMS
  • Unlocking the Benefits of Journaling
  • Mastering Engaging Presentations: Tips for Captivating Your Audience
  • The Business Value of Enterprise Architecture Explored
  • Celebrating 150+ Hours of STEM Impact

Categories

  • 21st Century Human
  • 3D Printing
  • AI
  • Applications
  • ArchiMate
  • Architecture
  • Arduino
  • Automation
  • BCS
  • Big Data
  • Certification
  • Climate Change
  • Cloud
  • Cobotics
  • Connected Home
  • Data
  • Data Fellowship
  • Data Science
  • Development
  • DevOps/OpsDev
  • Digital
  • DigitalFit
  • Drone
  • Enterprise Architecture
  • F-TAG
  • Governance
  • Health
  • Innovation
  • IoT
  • IT Strategy
  • Machine Learning
  • Metaverse
  • Micro:Bit
  • Mindset
  • Mobiles
  • Networks
  • Open Source
  • Podcasts
  • Productivity
  • Programming
  • Quantum
  • Raspberry Pi
  • Robotics
  • Scouting
  • Scouts
  • Security
  • Smart Home
  • Social Media
  • Space
  • STEM
  • Story Telling
  • Technologists Toolkit
  • Tools
  • Uncategorized
  • Wearable Tech
  • Windows
  • xR

Archives

Reading Shelf

Archives

Recent Posts

  • 35 Informative Tech Websites for 2026: Enhance Your PKMS
  • Unlocking the Benefits of Journaling
  • Mastering Engaging Presentations: Tips for Captivating Your Audience
  • The Business Value of Enterprise Architecture Explored
  • Celebrating 150+ Hours of STEM Impact

Top Posts & Pages

  • 35 Informative Tech Websites for 2026: Enhance Your PKMS
  • Unlocking the Benefits of Journaling
  • Mastering Performance Under Pressure: The Importance of Training
  • My Virtual Selfie - Avatars and Identity Security
  • 2026 PKMS Updates: Boost Productivity and Knowledge Retention
  • Lunch? No I've got a meeting!
  • Mastering Engaging Presentations: Tips for Captivating Your Audience
  • A-Z of Digital – Z is for Zabeta
  • The Importance of ArchiMate and UML in Modern Organisations
  • Technology Couch Podcast – Episode 3

Category Cloud

21st Century Human Architecture Big Data Cloud Data Data Science Development DevOps/OpsDev Digital DigitalFit Enterprise Architecture Governance Innovation IoT Machine Learning Mindset Open Source Podcasts Productivity Programming Raspberry Pi Robotics Security Social Media STEM Story Telling Technologists Toolkit Tools Uncategorized Wearable Tech

Tags

3D Printing 21st Century Human AI Applications ArchiMate Architecture Automation BCS Big Data Blockchain business Certification Cloud Cobot Cobotics Coding Communication Connected Home CPD cybersecurity Data Data Fellowship Data Science Delivery Development DevOps Digital DigitalFit Digital Human Drone Email Enterprise Architecture Governance GTD Infographic Information Theory Innovation IoT Journal Knowledge learning Machine Learning Metaverse MicroLearning Mindset Mixed Reality Networks Open Source OpsDev PKMS Podcasts Productivity Programming Proving It Quantum quantum-computing R RaspberryPI Robot Robotics Scouts Security Smart Home Social Media STEM Story Telling Technologists Toolkit technology Technology Couch Podcast Thinking Tools Visualisation Voice Wearable Tech xR

License

Creative Commons Licence
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Meta

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Blog at WordPress.com.

  • Subscribe Subscribed
    • Max Hemingway
    • Join 82 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Max Hemingway
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d